Awesome
lambdaworks
From the heights of these towers of fields, forty centuries of mathematics look down on us.
This library provides efficient implementation of cryptographic primitives used to build proving systems. Along with it, many backends for proving systems are shipped, and compatibility with different frontends is supported.
- Transforming the Future with Zero-Knowledge Proofs, Fully Homomorphic Encryption and new Distributed Systems algorithms
- Lambda Crypto Doctrine
Examples - mini apps
Below is a list of examples to understand lambdaworks and learn what you can build with the tools provided.
-
You can use Circom to generate circuits and use lambdaworks's capabilities to prove the execution with Groth16.
-
You can use the Stark prover to define an algebraic intermediate representation (AIR) and prove the execution of a program
Why we built lambdaworks
Zero-Knowledge and Validity Proofs have gained a lot of attention over the last few years. We strongly believe in this potential and that is why we decided to start working in this challenging ecosystem, where math, cryptography and distributed systems meet. The main barrier in the beginning was not the cryptography or math but the lack of good libraries which are performant and developer friendly. There are some exceptions, though, like gnark or halo2. Some have nice APIs and are easy to work with, but they are not written in Rust, and some are written in Rust but have poor programming and engineering practices. Most of them don't have support for CUDA, Metal and WebGPU or distributed FFT calculation using schedulers like Dask.
So, we decided to build our library, focusing on performance, with clear documentation and developer-focused. Our core team is a group of passionate people from different backgrounds and different strengths; we think that the whole is greater than just the addition of the parts. We don't want to be a compilation of every research result in the ZK space. We want this to be a library that can be used in production, not just in academic research. We want to offer developers the main building blocks and proof systems so that they can build their applications on top of this library.
Documentation
Main crates
Crypto
Most of math and crypto crates supports no-std without allocation with no-default-features
. A few functions and modules require the alloc
feature.
Both Math and Crypto support wasm with target wasm32-unknown-unknown
. To see an example of how to use this to deploy a verifier in a browser, check the Cairo Prover wasm-pack verifier.
Exercises and Challenges
Citing lambdaworks
If you use lambdaworks
libraries in your research projects, please cite them using the following template:
@software{lambdaworks,
author={lambdaworks contributors},
title={lambdaworks},
url={https://github.com/lambdaclass/lambdaworks},
year={2023}
}
List of features
Disclaimer: This list contains cryptographic primitives and mathematical structures that we want to support in lambdaworks. It can be expanded later to include new primitives. If you find there is a mistake or there has been an update in another library, please let us know.
List of symbols:
- :heavy_check_mark: means the feature is currently supported.
- 🏗️ means that the feature is partially implemented or is under active construction.
- :x: means that the feature is not currently supported.
Finite Fields | Lambdaworks | Arkworks | Halo2 | gnark | Constantine |
---|---|---|---|---|---|
StarkField 252 | :heavy_check_mark: | :heavy_check_mark: | :x: | :heavy_check_mark: | :x: |
Mersenne 31 | :heavy_check_mark: | :x: | :x: | :x: | :x: |
Baby Bear | :heavy_check_mark: | :x: | :x: | :x: | :x: |
MiniGoldilocks | :heavy_check_mark: | :x: | :x: | :heavy_check_mark: | :x: |
Binary fields | :x: | :x: | :x: | :x: | :x: |
ZK friendly Hash function | Lambdaworks | Arkworks | Halo2 | gnark | Constantine |
Poseidon | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :x: | :x: |
Pedersen | 🏗️ | :heavy_check_mark: | :heavy_check_mark: | :x: | :x: |
Rescue Prime XLIX | :x: | :x: | :x: | :x: | :x: |
Elliptic Curves | Lambdaworks | Arkworks | Halo2 | gnark | Constantine |
BLS12-381 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
BLS12-377 | :heavy_check_mark: | :heavy_check_mark: | :x: | :heavy_check_mark: | :heavy_check_mark: |
BN-254 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
Pallas | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :x: | :heavy_check_mark: |
Vesta | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :x: | :heavy_check_mark: |
Bandersnatch | 🏗️ | :heavy_check_mark: | :x: | :heavy_check_mark: | :heavy_check_mark: |
secp256k1 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
secq256k1 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :x: | :x: |
secq256r1 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :x: | :x: |
STARKs | Lambdaworks | Arkworks | Halo2 | gnark | Constantine |
STARK Prover | :heavy_check_mark: | :x: | :x: | :x: | :x: |
Circle STARKs | :x: | :x: | :x: | :x: | :x: |
SNARKs | Lambdaworks | Arkworks | Halo2 | gnark | Constantine |
Groth16 | :heavy_check_mark: | :heavy_check_mark: | :x: | :heavy_check_mark: | :x: |
Plonk | 🏗️ | :heavy_check_mark: | ✔️ | :heavy_check_mark: | :x: |
GKR | :x: | :heavy_check_mark: | :x: | :heavy_check_mark: | :x: |
Polynomial Commitment Schemes | Lambdaworks | Arkworks | Halo2 | gnark | Constantine |
KZG10 | :heavy_check_mark: | ✔️ | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
FRI | 🏗️ | :x: | :x: | :heavy_check_mark: | :x: |
Binius | :x: | :x: | :x: | :x: | :x: |
Circle FRI | :x: | :x: | :x: | :x: | :x: |
Additionally, provers are compatible with the following frontends and VMs:
Backend | Frontend | Status |
---|---|---|
Groth16 | Arkworks | :heavy_check_mark: |
Groth16 | Gnark | :x: |
Groth16 | Circom | 🏗️ |
Plonk | Gnark | 🏗️ |
Plonk | Noir | :x: |
Stark | Winterfell | :heavy_check_mark: |
Stark | Miden | :heavy_check_mark: |
This can be used in a multi prover setting for extra security, or as a standalone to be used with Rust.
Additional tooling usage
Fuzzers
Fuzzers are divided between the ones that use only the CPU, the ones that use Metal, and the ones that use CUDA.
To use them, make sure you have installed cargo fuzzer
You can install it with:
cargo install cargo-fuzz
CPU Fuzzers can be run with the command bash make run-fuzzer FUZZER=fuzzer_name
For example:
make run-fuzzer FUZZER=stark252
The list of fuzzers can be found in fuzz/no_gpu_fuzz
Fuzzers for FTT in Metal and Cuda can be run with make run-metal-fuzzer
and make run-cuda-fuzzer
Run a specific fuzzer from the ones contained in fuzz/fuzz_targets/ folder withcargo
, for example to run the one for the target field_from_hex
:
make run-fuzzer FUZZER=field_from_hex
Documentation building
To serve the documentation locally, first install both mdbook and the Katex preprocessor to render LaTeX, then run
make docs
Learning resources
If you want to learn about proof systems/cryptography, we have a list of resources available here
📚 References and acknowledgements
The following links, repos, companies and projects have been important in the development of this library and we want to thank and acknowledge them.
- Starkware
- Polygon
- Mina
- zcash
- Matter Labs
- o1Labs
- zkSync
- Aleo
- Risc0
- Aztec
- Ingonyama
- Neptune
- Winterfell
- Anatomy of a Stark
- Giza
- Ministark
- Sandstorm
- STARK-101
- starknet-rs
- Summary on FRI low degree test
- STARKs paper
- DEEP FRI
- BrainSTARK
- Plonky2
- Arkworks
- Thank goodness it's FRIday
- Diving DEEP FRI
- Periodic constraints
- Chiplets Miden VM
- Valida
- Solidity Verifier
- CAIRO verifier
- EthSTARK
- CAIRO whitepaper
- Gnark
- Constantine
- Plonky3